Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks

Wireless mesh networks (WMNs) have emerged as a flexible and low-cost network infrastructure, where heterogeneous mesh routers managed by different users collaborate to extend network coverage. This paper proposes a novel routing metric, Expected Forwarded Counter (EFW), and two further variants, to cope with the problem of selfish behavior (i.e., packet dropping) of mesh routers in a WMN. EFW combines, in a cross-layer fashion, routing-layer observations of forwarding behavior with MAC-layer measurements of wireless link quality to select the most reliable and high-performance path. We evaluate the proposed metrics both through simulations and real-life deployments on two different wireless testbeds, performing a comparative analysis with On-Demand Secure Byzantine Resilient Routing (ODSBR) Protocol and Expected Transmission Counter (ETX). The results show that our cross-layer metrics accurately capture the path reliability and considerably increase the WMN performance, even when a high percentage of network nodes misbehave.

[1]  Vikram Srinivasan,et al.  An analytical approach to the study of cooperation in wireless ad hoc networks , 2005, IEEE Transactions on Wireless Communications.

[2]  Fan Wu,et al.  On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks , 2007, MobiCom '07.

[3]  Vikram Srinivasan,et al.  Wi-Sh: A Simple, Robust Credit Based Wi-Fi Community Network , 2009, IEEE INFOCOM 2009.

[4]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[5]  Manpreet Singh,et al.  Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[6]  Qi Chen,et al.  Overhaul of ieee 802.11 modeling and simulation in ns-2 , 2007, MSWiM '07.

[7]  Stephan Eidenbenz,et al.  Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.

[8]  Levente Buttyán,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.

[9]  K. J. Ray Liu,et al.  Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.

[10]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[11]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.

[12]  Michalis Faloutsos,et al.  Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Network , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[13]  Dimitrios Koutsonikolas,et al.  High-throughput multicast routing metrics in wireless mesh networks , 2008, Ad Hoc Networks.

[14]  Yaling Yang,et al.  Design Guidelines for Routing Metrics in Multihop Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[15]  Dimitrios Koutsonikolas,et al.  High-Throughput Multicast Routing Metrics in Wireless Mesh Networks , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[16]  Xin Zhang,et al.  Packet-dropping adversary identification for data plane security , 2008, CoNEXT '08.

[17]  David Johnson,et al.  Comparison of two routing metrics in OLSR on a grid based mesh network , 2009, Ad Hoc Networks.

[18]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[19]  Paolo Santi,et al.  The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes , 2008, IEEE Transactions on Mobile Computing.

[20]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[21]  George C. Polyzos,et al.  Stimulating Participation in Wireless Community Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[22]  Cristina Nita-Rotaru,et al.  JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks , 2009, IEEE Transactions on Dependable and Secure Computing.

[23]  Wolfgang Kellerer,et al.  Castor: Scalable Secure Routing for Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[24]  Michalis Faloutsos,et al.  TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[25]  L. Kleinrock,et al.  Packet Switching in Radio Channels : Part Il-The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution , 2022 .

[26]  Simon Pietro Romano,et al.  A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[27]  Antonio Capone,et al.  EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants , 2011, 2011 Proceedings IEEE INFOCOM.

[28]  Jitendra Padhye,et al.  Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.

[29]  Yuguang Fang,et al.  ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.

[30]  Michalis Faloutsos,et al.  Routing amid Colluding Attackers , 2007, 2007 IEEE International Conference on Network Protocols.

[31]  Shaojie Tang,et al.  Dealing with Selfishness and Moral Hazard in Noncooperative Wireless Networks , 2010, IEEE Transactions on Mobile Computing.

[32]  Nagesh Nandiraju,et al.  Wireless Mesh Networks: Current Challenges and Future Directions of Web-In-The-Sky , 2007, IEEE Wireless Communications.

[33]  Baruch Awerbuch,et al.  Provably competitive adaptive routing , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[34]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[35]  R. Srikant,et al.  DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.

[36]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[37]  K. J. Ray Liu,et al.  Attack-resistant cooperation stimulation in autonomous ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[38]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[39]  Marcelo G. Rubinstein,et al.  Routing Metrics and Protocols for Wireless Mesh Networks , 2008, IEEE Network.

[40]  Edward W. Knightly,et al.  The IEEE 802.11s Extended Service Set Mesh Networking Standard , 2008, IEEE Communications Magazine.

[41]  Panagiotis Papadimitratos,et al.  Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.

[42]  Kang G. Shin,et al.  On accurate measurement of link quality in multi-hop wireless mesh networks , 2006, MobiCom '06.

[43]  Reza Curtmola,et al.  ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.

[44]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).